Microsoft Office 365 ProPlus Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates −1 ✎ 65
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Removed rules 1
- V-99661 Medium Office clients must be prevented from polling Office servers for published links.
Content changes 65
- V-100517 Medium checkfix File validation in Word must be enabled.
- V-99645 Medium description The Office client must be prevented from polling the SharePoint Server for published links.
- V-99647 Medium description Custom user interface (UI) code must be blocked from loading in all Office applications.
- V-99649 Medium check ActiveX Controls must be initialized in Safe Mode.
- V-99651 Medium description Macros in all Office applications that are opened programmatically by another application must be opened based upon macro security level.
- V-99653 Medium description Trust Bar notifications must be configured to display information in the Message Bar about the content that has been automatically blocked.
- V-99659 Medium description Users must be prevented from creating new trusted locations in the Trust Center.
- V-99663 Medium description Office applications must not load XML expansion packs with Smart Documents.
- V-99665 Medium descriptioncheck The load of controls in Forms3 must be blocked.
- V-99673 Medium description The Information Bar must be enabled in all Office programs.
- V-99675 Medium check The Local Machine Zone Lockdown Security must be enabled in all Office programs.
- V-99691 Medium check Scripted Windows Security restrictions must be enabled in all Office programs.
- V-99693 Medium checkfix Flash player activation must be disabled in all Office programs.
- V-99699 Medium check Dynamic Data Exchange (DDE) server launch in Excel must be blocked.
- V-99701 Medium check Dynamic Data Exchange (DDE) server lookup in Excel must be blocked.
- V-99729 Medium checkfix Extraction options must be blocked when opening corrupt Excel workbooks.
- V-99733 Medium checkfix Loading of pictures from Web pages not created in Excel must be disabled.
- V-99735 Medium checkfix AutoRepublish in Excel must be disabled.
- V-99737 Medium checkfix AutoRepublish warning alert in Excel must be enabled.
- V-99739 Medium checkfix File extensions must be enabled to match file types in Excel.
- V-99741 Medium checkfix Scan of encrypted macros in Excel Open XML workbooks must be enabled.
- V-99743 Medium checkfix File validation in Excel must be enabled.
- V-99745 Medium checkfix WEBSERVICE Function Notification in Excel must be configured to disable all, with notifications.
- V-99747 Medium checkfix Macros must be blocked from running in Excel files from the Internet.
- V-99749 Medium checkfix Trust Bar notification must be enabled for unsigned application add-ins in Excel and blocked.
- V-99751 Medium checkfix Untrusted Microsoft Query files must be blocked from opening in Excel.
- V-99753 Medium checkfix Untrusted database files must be opened in Excel in Protected View mode.
- V-99755 Medium checkfix Files from Internet zone must be opened in Excel in Protected View mode.
- V-99757 Medium checkfix Files from unsafe locations must be opened in Excel in Protected View mode.
- V-99761 Medium checkfix File attachments from Outlook must be opened in Excel in Protected mode.
- V-99769 Medium checkfix Outlook must use remote procedure call (RPC) encryption to communicate with Microsoft Exchange servers.
- V-99771 Medium fix Scripts associated with public folders must be prevented from execution in Outlook.
- V-99773 Medium checkfix Scripts associated with shared folders must be prevented from execution in Outlook.
- V-99775 Medium checkfix Files dragged from an Outlook e-mail to the file system must be created in ANSI format.
- V-99779 Medium checkfix Active X One-Off forms must only be enabled to load with Outlook Controls.
- V-99781 Medium checkfix Outlook must be configured to prevent users overriding attachment security settings.
- V-99783 Medium checkfix Internet must not be included in Safe Zone for picture download in Outlook.
- V-99785 Medium checkfix The Publish to Global Address List (GAL) button must be disabled in Outlook.
- V-99787 Medium checkfix The minimum encryption key length in Outlook must be at least 168.
- V-99789 Medium checkfix The warning about invalid digital signatures must be enabled to warn Outlook users.
- V-99791 Medium checkfix Outlook must be configured to allow retrieving of Certificate Revocation Lists (CRLs) always when online.
- V-99793 Medium checkfix The Outlook Security Mode must be enabled to always use the Outlook Security Group Policy.
- V-99797 Medium check The display of Level 1 attachments must be disabled in Outlook.
- V-99805 Medium checkfix When a custom action is executed that uses the Outlook object model, Outlook must automatically deny it.
- V-99807 Medium checkfix When an untrusted program attempts to programmatically access an Address Book using the Outlook object model, Outlook must automatically deny it.
- V-99809 Medium checkfix When a user designs a custom form in Outlook and attempts to bind an Address Information field to a combination or formula custom field, Outlook must automatically deny it.
- V-99811 Medium checkfix When an untrusted program attempts to use the Save As command to programmatically save an item, Outlook must automatically deny it.
- V-99813 Medium checkfix When an untrusted program attempts to gain access to a recipient field, such as the, To: field, using the Outlook object model, Outlook must automatically deny it.
- V-99815 Medium checkfix When an untrusted program attempts to programmatically send e-mail in Outlook using the Response method of a task or meeting request, Outlook must automatically deny it.
- V-99817 Medium checkfix When an untrusted program attempts to send e-mail programmatically using the Outlook object model, Outlook must automatically deny it.
- V-99821 Medium checkfix The Security Level for macros in Outlook must be configured to Warn for signed and disable unsigned.
- V-99825 Medium checkfix VBA Macros not digitally signed must be blocked in PowerPoint.
- V-99827 Medium checkfix The ability to run programs from PowerPoint must be disabled.
- V-99829 Medium checkfix Open/Save of PowerPoint 97-2003 presentations, shows, templates, and add-in files must be blocked.
- V-99851 Medium checkfix Trusted Locations on the network must be disabled in Project.
- V-99855 Medium checkfix VBA Macros not digitally signed must be blocked in Project.
- V-99857 Medium checkfix Publisher must be configured to prompt the user when another application programmatically opens a macro.
- V-99859 Medium checkfix Publisher must automatically disable unsigned add-ins without informing users.
- V-99861 Medium check Publisher must disable all unsigned VBA macros.
- V-99863 Medium checkfix VBA Macros not digitally signed must be blocked in Visio.
- V-99867 Medium checkfix Visio must automatically disable unsigned add-ins without informing users.
- V-99875 Medium checkfix Macros must be blocked from running in Visio files from the Internet.
- V-99879 Medium checkfix In Word, encrypted macros must be scanned.
- V-99909 Medium checkfix Trusted Locations on the network must be disabled in Word.
- V-99911 Medium checkfix VBA Macros not digitally signed must be blocked in Word.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-AC-000001
- Vuln IDs
-
- V-99633
- Rule IDs
-
- SV-108737r1_rule
Checks: C-98483r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Block macros from running in Office files from the Internet" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\access\security If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding.
Fix: F-105317r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Block macros from running in Office files from the Internet" to "Enabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-AC-000002
- Vuln IDs
-
- V-99635
- Rule IDs
-
- SV-108739r1_rule
Checks: C-98485r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\access\security If the value NoTBPromptUnsignedAddin is REG_DWORD = 1, this is not a finding.
Fix: F-105319r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- O365-AC-000003
- Vuln IDs
-
- V-99637
- Rule IDs
-
- SV-108741r1_rule
Checks: C-98487r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center >> VBA Macro Notification Settings is set to "Disable all except digitally signed macros". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\access\security If the value vbawarnings is REG_DWORD = 2, this is not a finding. Values of REG_DWORD = 3 or 4 are also acceptable values. If the registry key does not exist or the value is REG_DWORD =1, this is a finding.
Fix: F-105321r1_fix
Set User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center >> VBA Macro Notification Settings to "Disable all except digitally signed macros".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-AC-000004
- Vuln IDs
-
- V-99639
- Rule IDs
-
- SV-108743r1_rule
Checks: C-98489r1_chk
Verify the policy for Set the User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center >> Trusted Locations >> Allow trusted Locations on the network is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\access\security\trusted locations If the value for allownetworklocations is REG_DWORD = 0, this is not a finding.
Fix: F-105323r1_fix
Set the User Configuration >> Administrative Templates >> Microsoft Access 2016 >> Application Settings >> Security >> Trust Center >> Trusted Locations >> Allow trusted Locations on the network to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-CO-000001
- Vuln IDs
-
- V-99641
- Rule IDs
-
- SV-108745r1_rule
Checks: C-98491r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016>> Security Settings "Macro Runtime Scan Scope" is set to "Enable for all documents". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security If the value for macroruntimescanscope is REG_DWORD = 1, this is not a finding.
Fix: F-105325r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016>> Security Settings "Macro Runtime Scan Scope" to "Enable for all documents".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-002476
- Version
- O365-CO-000002
- Vuln IDs
-
- V-99643
- Rule IDs
-
- SV-108747r1_rule
Checks: C-98493r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Protect document metadata for rights managed Office Open XML Files" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\common\security If the value DRMEncryptProperty is REG_DWORD = 1, this is not a finding.
Fix: F-105327r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Protect document metadata for rights managed Office Open XML Files" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- O365-CO-000003
- Vuln IDs
-
- V-99645
- Rule IDs
-
- SV-108749r2_rule
Checks: C-98495r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Server Settings >> Disable the Office client from polling the SharePoint Server for published links is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\portal If the value for linkpublishingdisabled is REG_DWORD = "1", this is not a finding.
Fix: F-105329r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Server Settings >> Disable the Office client from polling the SharePoint Server for published links to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-CO-000004
- Vuln IDs
-
- V-99647
- Rule IDs
-
- SV-108751r2_rule
Checks: C-98497r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Global Options >> Customize >> Disable UI extending from documents and templates is set to Enabled: Disallow in Word; Excel; PowerPoint; Access; Outlook; Publisher; Project; Visio; InfoPath Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\toolbars If the value noextensibilitycustomizationfromdocument is REG_DWORD = 1 for all installed Office programs, this is not a finding.
Fix: F-105331r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Global Options >> Customize >> Disable UI extending from documents and templates to Enabled: Disallow in Word; Excel; PowerPoint; Access; Outlook; Publisher; Project; Visio; InfoPath.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-CO-000005
- Vuln IDs
-
- V-99649
- Rule IDs
-
- SV-108753r2_rule
Checks: C-98499r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "ActiveX Control Initialization" is set to "Enabled (If SFI, load the control in safe mode and use persisted values (if any). If not SFI, prompt the user and advise them that it is marked unsafe. If the user chooses No at the prompt, do not load the control. Otherwise, load it with persisted values.) Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security If the value UFIControls exists, this is a finding.
Fix: F-105333r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "ActiveX Control Initialization" to "Enabled + 6".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-CO-000006
- Vuln IDs
-
- V-99651
- Rule IDs
-
- SV-108755r2_rule
Checks: C-98501r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Automation Security" is set to "Enabled (Use application macro security level)". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\Common\Security If the value AutomationSecurity is REG_DWORD = 2, this is not a finding.
Fix: F-105335r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Automation Security" to "Enabled (Use application macro security level)".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-CO-000007
- Vuln IDs
-
- V-99653
- Rule IDs
-
- SV-108757r2_rule
Checks: C-98503r2_chk
Verify the policy value for User Configuration >> Microsoft Office 2016 >> Security Settings >> Disable all Trust Bar notifications for security issues is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\trustcenter If the value for trustbar is set to REG_DWORD = 0, this is not a finding.
Fix: F-105337r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Disable all Trust Bar notifications for security issues" to "Disabled".
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- O365-CO-000008
- Vuln IDs
-
- V-99655
- Rule IDs
-
- SV-108759r1_rule
Checks: C-98505r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office 97-2003 files is set to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security If the value defaultencryption12 is set to REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256", this is not a finding.
Fix: F-105339r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office 97-2003 files to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- O365-CO-000009
- Vuln IDs
-
- V-99657
- Rule IDs
-
- SV-108761r1_rule
Checks: C-98507r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office Open XML files is set to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security If the value OpenXMLEncryption is REG_SZ = "Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256", this is not a finding.
Fix: F-105341r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Encryption type for password protected Office Open XML files to Microsoft Enhanced RSA and AES Cryptographic Provider,AES 256,256.
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- O365-CO-000010
- Vuln IDs
-
- V-99659
- Rule IDs
-
- SV-108763r2_rule
Checks: C-98509r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016\Security Settings\Trust Center >> Allow mix of policy and user locations is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\common\security\trusted locations If the value for allow user locations is set to REG_DWORD = 0, this is not a finding.
Fix: F-105343r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings >> Trust Center >> Allow mix of policy and user locations to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-CO-000012
- Vuln IDs
-
- V-99663
- Rule IDs
-
- SV-108767r2_rule
Checks: C-98513r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Smart Documents (Word, Excel) >> Disable Smart Document's use of manifests is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\common\smart tag If the value for neverloadmanifests is REG_DWORD = 1, this is not a finding.
Fix: F-105347r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Smart Documents (Word, Excel) >> Disable Smart Document's use of manifests to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-CO-000013
- Vuln IDs
-
- V-99665
- Rule IDs
-
- SV-108769r2_rule
Checks: C-98515r6_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Load Controls in Forms3" is set to "Enabled (For a UFI or SFI signed control that supports safe and unsafe mode, load the control in unsafe mode. For an SFI signed control that only supports a safe mode configuration, load the control in safe mode. This option enforces the default configuration.)". Use the Windows Registry Editor to navigate to the following key: HKCU\keycupoliciesmsvbasecurity If the value LoadControlsInForms exists, this is a finding.
Fix: F-105349r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Office 2016 >> Security Settings "Load Controls in Forms3" to "Enabled:1".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-CO-000014
- Vuln IDs
-
- V-99667
- Rule IDs
-
- SV-108771r1_rule
Checks: C-98517r1_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security "Add-on Management" is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_ADDON_MANAGEMENT If the value for each installed Office Program is REG_DWORD = 1, this is not a finding.
Fix: F-105351r1_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security "Add-on Management" to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- O365-CO-000015
- Vuln IDs
-
- V-99669
- Rule IDs
-
- SV-108773r1_rule
Checks: C-98519r2_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Consistent Mime Handling is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_mime_handling If the value for all installed Office programs is set to "True", this is not a finding.
Fix: F-105353r2_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security "Consistent Mime Handling" to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-CO-000016
- Vuln IDs
-
- V-99671
- Rule IDs
-
- SV-108775r1_rule
Checks: C-98521r1_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security "Disable user name and password" is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_HTTP_USERNAME_PASSWORD_DISABLE If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-105355r1_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security "Disable user name and password" to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-CO-000017
- Vuln IDs
-
- V-99673
- Rule IDs
-
- SV-108777r2_rule
Checks: C-98523r1_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Information Bar is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_securityband If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-105357r1_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Information Bar to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-CO-000018
- Vuln IDs
-
- V-99675
- Rule IDs
-
- SV-108779r2_rule
Checks: C-98525r2_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Local Machine Zone Lockdown Security is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_localmachine_lockdown If the value for all installed Office programs is REG_DWORD = 1, this is not a finding.
Fix: F-105359r1_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Local Machine Zone Lockdown to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- O365-CO-000019
- Vuln IDs
-
- V-99677
- Rule IDs
-
- SV-108781r1_rule
Checks: C-98527r2_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Mime Sniffing Safety Feature is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_mime_sniffing If the value for all installed Office Programs is REG_DWORD = 1, this is not a finding.
Fix: F-105361r2_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Mime Sniffing Safety Feature to "Enabled" for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-CO-000020
- Vuln IDs
-
- V-99679
- Rule IDs
-
- SV-108783r1_rule
Checks: C-98529r1_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Navigate URL is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_validate_navigate_url If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-105363r2_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Navigate URL to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- IA-7
- Severity
- M
- CCI
- CCI-000803
- Version
- O365-CO-000021
- Vuln IDs
-
- V-99681
- Rule IDs
-
- SV-108785r1_rule
Checks: C-98531r2_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Object Caching Protection is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_object_caching If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-105365r3_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Object Caching Protection to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- O365-CO-000022
- Vuln IDs
-
- V-99683
- Rule IDs
-
- SV-108787r1_rule
Checks: C-98533r2_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Protection from Zone Elevation is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_zone_elevation If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-105367r2_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Protection from Zone Elevation to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-CO-000023
- Vuln IDs
-
- V-99685
- Rule IDs
-
- SV-108789r1_rule
Checks: C-98535r1_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Restrict ActiveX Install is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_restrict_activexinstall If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-105369r1_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Restrict ActiveX Install to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- O365-CO-000024
- Vuln IDs
-
- V-99687
- Rule IDs
-
- SV-108791r1_rule
Checks: C-98537r1_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Restrict File Download is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_restrict_filedownload If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-105371r1_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Restrict File Download to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-CO-000025
- Vuln IDs
-
- V-99689
- Rule IDs
-
- SV-108793r1_rule
Checks: C-98539r1_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Saved from URL is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\software\microsoft\internet explorer\main\featurecontrol\feature_unc_saved If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-105373r1_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Saved from URL to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- O365-CO-000026
- Vuln IDs
-
- V-99691
- Rule IDs
-
- SV-108795r2_rule
Checks: C-98541r2_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >> Scripted Window Security Restrictions is set to "Enabled" and the check box is selected for every installed Office program. Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_WINDOW_RESTRICTIONS If the value for all installed programs is REG_DWORD = 1, this is not a finding.
Fix: F-105375r1_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Microsoft Office 2016 (Machine) >> Security Settings >> IE Security >>Scripted Window Security Restrictions to "Enabled" and select the check boxes for all installed Office programs.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-CO-000027
- Vuln IDs
-
- V-99693
- Rule IDs
-
- SV-108797r2_rule
Checks: C-98543r3_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> Block Flash activation in Office documents >> Enabled >> Block all activation is set to "Enabled" Block all activation. Use the Windows Registry Editor to navigate to the following key: HKLM\SOFTWARE\Microsoft\Office\Common\COM Compatibility If the value for COMMENT is REG_DWORD = 1, this is not a finding.
Fix: F-105377r3_fix
Set the policy value for Computer Configuration >> Administrative Templates >> MS Security Guide >> Block Flash activation in Office documents >> Enabled >> Block all activation to "Enabled" (Block all activation).
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-EX-000001
- Vuln IDs
-
- V-99695
- Rule IDs
-
- SV-108799r1_rule
Checks: C-98545r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Trusted Locations "Allow Trusted Locations on the network" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\trusted locations If the value AllowNetworkLocations is REG_DWORD = 0, this is not a finding.
Fix: F-105379r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Trusted Locations "Allow Trusted Locations on the network" to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- O365-EX-000002
- Vuln IDs
-
- V-99697
- Rule IDs
-
- SV-108801r1_rule
Checks: C-98547r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Application Settings >> Security >> Trust Center >> "VBA macro Notification Settings" is set to "Enabled" and "Disable all except digitally signed macros" from the Options. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\excel\security If the value vbawarnings is REG_DWORD = 3, this is not a finding.
Fix: F-105381r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Application Settings >> Security >> Trust Center >> "VBA macro Notification Settings" to "Enabled" and "Disable all except digitally signed macros" from the Options.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000003
- Vuln IDs
-
- V-99699
- Rule IDs
-
- SV-108803r2_rule
Checks: C-98549r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Don't allow Dynamic Data Exchange (DDE) server launch in Excel is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\external content If the value for "disableddeserverlaunch" is REG_DWORD = 1, this is not a finding.
Fix: F-105383r1_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Don't allow Dynamic Data Exchange (DDE) server launch in Excel to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000004
- Vuln IDs
-
- V-99701
- Rule IDs
-
- SV-108805r2_rule
Checks: C-98551r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Don't allow Dynamic Data Exchange (DDE) server lookup in Excel is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\external content If the value for "disableddeserverlookup" is REG_DWORD = 1, this is not a finding.
Fix: F-105385r1_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Don't allow Dynamic Data Exchange (DDE) server lookup in Excel to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000005
- Vuln IDs
-
- V-99703
- Rule IDs
-
- SV-108807r1_rule
Checks: C-98553r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "dBase III / IV files" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value DBaseFiles is REG_DWORD = 2, this is not a finding.
Fix: F-105387r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "dBase III / IV files" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000006
- Vuln IDs
-
- V-99705
- Rule IDs
-
- SV-108809r1_rule
Checks: C-98555r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Dif and Sylk files" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value DifandSylkFiles is REG_DWORD = 2, this is not a finding.
Fix: F-105389r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Dif and Sylk files" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000007
- Vuln IDs
-
- V-99707
- Rule IDs
-
- SV-108811r1_rule
Checks: C-98557r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 2 macrosheets and add-in files" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value XL2Macros is REG_DWORD = 2, this is not a finding.
Fix: F-105391r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 2 macrosheets and add-in files" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000008
- Vuln IDs
-
- V-99709
- Rule IDs
-
- SV-108813r1_rule
Checks: C-98559r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 2 worksheets" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value XL2Worksheets is REG_DWORD = 2, this is not a finding.
Fix: F-105393r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 2 worksheets" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000009
- Vuln IDs
-
- V-99711
- Rule IDs
-
- SV-108815r1_rule
Checks: C-98561r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 3 macrosheets and add-in files" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value XL3Macros is REG_DWORD = 2, this is not a finding.
Fix: F-105395r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 3 macrosheets and add-in files" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000010
- Vuln IDs
-
- V-99713
- Rule IDs
-
- SV-108817r1_rule
Checks: C-98563r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 3 worksheets" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value XL3Worksheets is REG_DWORD = 2, this is not a finding.
Fix: F-105397r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 3 worksheets" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000011
- Vuln IDs
-
- V-99715
- Rule IDs
-
- SV-108819r1_rule
Checks: C-98565r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 4 macrosheets and add-in files" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value XL4Macros is REG_DWORD = 2, this is not a finding.
Fix: F-105399r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 4 macrosheets and add-in files" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000012
- Vuln IDs
-
- V-99717
- Rule IDs
-
- SV-108821r1_rule
Checks: C-98567r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 4 workbooks" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value XL4Workbooks is REG_DWORD = 2, this is not a finding.
Fix: F-105401r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 4 workbooks" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000013
- Vuln IDs
-
- V-99719
- Rule IDs
-
- SV-108823r1_rule
Checks: C-98569r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 4 worksheets" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value XL4Worksheets is REG_DWORD = 2, this is not a finding.
Fix: F-105403r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 4 worksheets" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000014
- Vuln IDs
-
- V-99721
- Rule IDs
-
- SV-108825r1_rule
Checks: C-98571r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings >> Excel 95 workbooks is set to "Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\fileblock If the value for xl9597workbooksandtemplates is REG_DWORD = 2, this is not a finding.
Fix: F-105405r1_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings >> Excel 95 workbooks to "Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000015
- Vuln IDs
-
- V-99723
- Rule IDs
-
- SV-108827r1_rule
Checks: C-98573r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 95-97 workbooks and templates" is set to "Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\office\16.0\excel\security\fileblock If the value XL9597WorkbooksandTemplates is REG_DWORD = 2, this is not a finding.
Fix: F-105407r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings "Excel 95-97 workbooks and templates" to "Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000016
- Vuln IDs
-
- V-99725
- Rule IDs
-
- SV-108829r1_rule
Checks: C-98575r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings >> Set default file block behavior is set to "Blocked files are not opened". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\excel\security\fileblock If the value OpenInProtectedView is REG_DWORD = 0, this is not a finding.
Fix: F-105409r1_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings >> Set default file block behavior to "Enabled:Blocked files are not opened".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000017
- Vuln IDs
-
- V-99727
- Rule IDs
-
- SV-108831r1_rule
Checks: C-98577r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings >> Web pages and Excel 2003 XML spreadsheets is set to "Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\fileblock If the value for htmlandxmlssfiles is REG_DWORD = 2, this is not a finding.
Fix: F-105411r1_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> File Block Settings >> Web pages and Excel 2003 XML spreadsheets to "Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000018
- Vuln IDs
-
- V-99729
- Rule IDs
-
- SV-108833r2_rule
Checks: C-98579r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Data Recovery >> Do not show data extraction options when opening corrupt workbooks is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\options If the value for extractdatadisableui is REG_DWORD = 1, this is not a finding.
Fix: F-105413r2_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Data Recovery >> Do not show data extraction options when opening corrupt workbooks to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-EX-000019
- Vuln IDs
-
- V-99731
- Rule IDs
-
- SV-108835r1_rule
Checks: C-98581r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Advanced >> Ask to update automatic links is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\options\binaryoptions If the value for fupdateext_78_1 is REG_DWORD = 1, this is not a finding.
Fix: F-105415r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Advanced >> Ask to update automatic links to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-EX-000020
- Vuln IDs
-
- V-99733
- Rule IDs
-
- SV-108837r2_rule
Checks: C-98583r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Advanced >> Web Options... >> General. Load pictures from Web pages not created in Excel is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\internet If the value for donotloadpictures is REG_DWORD = 1, this is not a finding.
Fix: F-105417r3_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Advanced >> Web Options... >> General >> Load pictures from Web pages not created in Excel to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-EX-000021
- Vuln IDs
-
- V-99735
- Rule IDs
-
- SV-108839r2_rule
Checks: C-98585r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Save >> Disable AutoRepublish is to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\options If the value for disableautorepublish is REG_DWORD = 1, this is not a finding.
Fix: F-105419r2_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Save >> Disable AutoRepublish to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-EX-000022
- Vuln IDs
-
- V-99737
- Rule IDs
-
- SV-108841r2_rule
Checks: C-98587r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Save >> Do not show AutoRepublish warning alert is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\options If value for disableautorepublishwarning is REG_DWORD = 1, this is not a finding.
Fix: F-105421r2_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Save >> Do not show AutoRepublish warning alert to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-EX-000023
- Vuln IDs
-
- V-99739
- Rule IDs
-
- SV-108843r2_rule
Checks: C-98589r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Force file extension to match file type is set to "Always match file type". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security If value for extensionhardening is REG_DWORD = 1, this is not a finding.
Fix: F-105423r2_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Force file extension to match file type to "Always match file type".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-EX-000024
- Vuln IDs
-
- V-99741
- Rule IDs
-
- SV-108845r2_rule
Checks: C-98591r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Scan encrypted macros in Excel Open XML workbooks is set to "Scan encrypted macros (default)". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security If the value excelbypassencryptiedmacrosscan does not exist, this is not a finding. If the value for excelbypassencryptedmacroscan is REG_DWORD = 0, this is not a finding.
Fix: F-105425r2_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Scan encrypted macros in Excel Open XML workbooks to "Scan encrypted macros (default)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- O365-EX-000025
- Vuln IDs
-
- V-99743
- Rule IDs
-
- SV-108847r2_rule
Checks: C-98593r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Turn off file validation is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\filevalidation If the value for enableonload is REG_DWORD = 1, this is not a finding.
Fix: F-105427r2_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Turn off file validation to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000026
- Vuln IDs
-
- V-99745
- Rule IDs
-
- SV-108849r2_rule
Checks: C-98595r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> WEBSERVICE Function Notification Settings is set to "Enabled" and "Disable all with notification". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security If the value webservicefunctionwarnings does not exist, this is not a finding. If the value for webservicefunctionwarnings is REG_DWORD = 1, this is not a finding. If the value for webservicefunctionwarnings is REG_DWORD = 2, this is a finding.
Fix: F-105429r2_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> WEBSERVICE Function Notification Settings to "Enabled" and "Disable all with notification".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-EX-000027
- Vuln IDs
-
- V-99747
- Rule IDs
-
- SV-108851r2_rule
Checks: C-98597r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Block macros from running in Office files from the Internet is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding.
Fix: F-105431r2_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Block macros from running in Office files from the Internet to "Enabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-EX-000028
- Vuln IDs
-
- V-99749
- Rule IDs
-
- SV-108853r2_rule
Checks: C-98599r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins and block them is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security If the value for notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix: F-105433r2_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins and block them to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000029
- Vuln IDs
-
- V-99751
- Rule IDs
-
- SV-108855r2_rule
Checks: C-98601r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Always prevent untrusted Microsoft Query files from opening is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\keycuexcelexternalcontent If the value for enableblockunsecurequeryfiles is Reg_DWORD = 1, this is not a finding.
Fix: F-105435r3_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Always prevent untrusted Microsoft Query files from opening to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000030
- Vuln IDs
-
- V-99753
- Rule IDs
-
- SV-108857r2_rule
Checks: C-98603r5_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Protected View Always open untrusted database files in Protected View is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: Microsoft Excel 2016\Excel Options\Security\Trust Center\Protected View If the value for enabledatabasefileprotectedview is REG_DWORD = 1, this is not a finding.
Fix: F-105437r4_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> External Content >> Always open untrusted database files in Protected View to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-EX-000031
- Vuln IDs
-
- V-99755
- Rule IDs
-
- SV-108859r2_rule
Checks: C-98605r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Do not open files from the Internet zone in Protected View is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\protectedview If the value DisableInternetFilesInPV is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is REG_DWORD = 1, this is a finding.
Fix: F-105439r2_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Do not open files from the Internet zone in Protected View to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-EX-000032
- Vuln IDs
-
- V-99757
- Rule IDs
-
- SV-108861r2_rule
Checks: C-98607r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Do not open files in unsafe locations in Protected View is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\protectedview If the value DisableUnsafeLocationsInPV is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is REG_DWORD = 1, this is a finding.
Fix: F-105441r2_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Do not open files in unsafe locations in Protected View to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-EX-000033
- Vuln IDs
-
- V-99759
- Rule IDs
-
- SV-108863r1_rule
Checks: C-98609r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Set document behavior if file validation fails is set to "Enabled: Open in Protected View". Verify the check box for "Allow edit" is not selected. Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\Excel\security\filevalidation If the value openinprotectedview does not exist, this is not a finding. If both the value for openinprotectedview is REG_DWORD = 1 and the value for DisableEditFromPV is set to REG_DWORD = 1, this is not a finding.
Fix: F-105443r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Set document behavior if file validation fails to "Enabled: Open in Protected View". Uncheck the "Allow edit" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-EX-000034
- Vuln IDs
-
- V-99761
- Rule IDs
-
- SV-108865r2_rule
Checks: C-98611r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Turn off Protected View for attachments opened from Outlook is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\excel\security\protectedview If the value DisableAttachmentsInPV is REG_DWORD = 0, this is not a finding.
Fix: F-105445r2_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Excel 2016 >> Excel Options >> Security >> Trust Center >> Protected View >> Turn off Protected View for attachments opened from Outlook to "Disabled".
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- O365-LY-000001
- Vuln IDs
-
- V-99763
- Rule IDs
-
- SV-108867r1_rule
Checks: C-98613r1_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Skype for Business 2016 >> Microsoft Lync Feature Policies "Configure SIP security mode" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\office\16.0\lync If the value enablesiphighsecuritymode is REG_DWORD = 1, this is not a finding.
Fix: F-105447r1_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Skype for Business 2016 >> Microsoft Lync Feature Policies "Configure SIP security mode" to "Enabled".
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001184
- Version
- O365-LY-000002
- Vuln IDs
-
- V-99765
- Rule IDs
-
- SV-108869r1_rule
Checks: C-98615r1_chk
Verify the policy value for Computer Configuration >> Administrative Templates >> Skype for Business 2016 >> Microsoft Lync Feature Policies "Disable HTTP fallback for SIP connection" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKLM\Software\Policies\Microsoft\office\16.0\lync If the value disablehttpconnect is REG_DWORD = 1, this is not a finding.
Fix: F-105449r1_fix
Set the policy value for Computer Configuration >> Administrative Templates >> Skype for Business 2016 >> Microsoft Lync Feature Policies "Disable HTTP fallback for SIP connection" to "Enabled".
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- O365-OU-000001
- Vuln IDs
-
- V-99767
- Rule IDs
-
- SV-108871r1_rule
Checks: C-98617r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Account Settings >> Exchange >> Authentication with Exchange Server is set to Kerberos Password Authentication. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security!authenticationservice If the value authenticationservice is set to REG_DWORD = 16 (decimal) or 10 (hex), this is not a finding.
Fix: F-105451r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Account Settings >> Exchange >> Authentication with Exchange Server to Kerberos Password Authentication.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- O365-OU-000002
- Vuln IDs
-
- V-99769
- Rule IDs
-
- SV-108873r2_rule
Checks: C-98619r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Account Settings >> Exchange >> Enable RPC encryption is set to "Enabled". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\rpc If the value for enablerpcencryption is set to REG_DWORD = 1, this is not a finding.
Fix: F-105453r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Account Settings >> Exchange >> Enable RPC encryption to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-OU-000003
- Vuln IDs
-
- V-99771
- Rule IDs
-
- SV-108875r2_rule
Checks: C-98621r2_chk
Verify the policy for Microsoft Outlook 2016 >> Outlook Options >> Other >> Advanced >> Do not allow Outlook object model scripts to run for public folders is set to "Enabled". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for publicfolderscript is set to REG_DWORD = 1, this is not a finding.
Fix: F-105455r2_fix
Set the policy for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Outlook Options >> Other >> Advanced >> Do not allow Outlook object model scripts to run for public folders to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-OU-000004
- Vuln IDs
-
- V-99773
- Rule IDs
-
- SV-108877r2_rule
Checks: C-98623r3_chk
Verify the policy for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Outlook Options >> Other >> Advanced >> Do not allow Outlook object model scripts to run for shared folders is set to "Enabled". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for sharedfolderscript is set to REG_DWORD = 1, this is not a finding.
Fix: F-105457r2_fix
Set the policy for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Outlook Options >> Other >> Advanced >> Do not allow Outlook object model scripts to run for shared folders to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-OU-000005
- Vuln IDs
-
- V-99775
- Rule IDs
-
- SV-108879r2_rule
Checks: C-98625r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Outlook Options >> Other >> Advanced >> Use Unicode format when dragging e-mail message to file system is set to "Disabled". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\options\general If the value for msgformat is set to REG_DWORD = 0, this is not a finding.
Fix: F-105459r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Outlook Options >> Other >> Advanced >> Use Unicode format when dragging e-mail message to file system to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-OU-000006
- Vuln IDs
-
- V-99777
- Rule IDs
-
- SV-108881r1_rule
Checks: C-98627r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Outlook Options >> Preferences >> Junk E-mail >> Junk E-mail protection level is set to "High". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\options\mail If the value junkmailprotection is set to "High", this is not a finding.
Fix: F-105461r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Outlook Options >> Preferences >> Junk E-mail >> Junk E-mail protection level to "High".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-OU-000007
- Vuln IDs
-
- V-99779
- Rule IDs
-
- SV-108883r2_rule
Checks: C-98629r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Allow Active X One Off Forms is set to "Enabled" "Load only Outlook Controls". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for allowactivexoneoffforms is REG_DWORD = 0, this is not a finding.
Fix: F-105463r3_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Allow Active X One Off Forms to "Enabled" "Load only Outlook Controls".
- RMF Control
- AC-6
- Severity
- M
- CCI
- CCI-002235
- Version
- O365-OU-000008
- Vuln IDs
-
- V-99781
- Rule IDs
-
- SV-108885r2_rule
Checks: C-98631r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Prevent users from customizing attachment security settings is set to "Enabled". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook If the value for disallowattachmentcustomization is set to REG_DWORD = 1, this is not a finding.
Fix: F-105465r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Prevent users from customizing attachment security settings to "Enabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-OU-000009
- Vuln IDs
-
- V-99783
- Rule IDs
-
- SV-108887r2_rule
Checks: C-98633r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Automatic Picture Download Settings >> Include Internet in Safe Zones for Automatic Picture Download is set to "Disabled". Use the Windows Registry to navigate to the following key: HKCU\software\policies\ microsoft\office\ 16.0\outlook\options\mail If the value for Internet is set to REG_DWORD = 0, this is not a finding.
Fix: F-105467r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Automatic Picture Download Settings >> Include Internet in Safe Zones for Automatic Picture Download to "Disabled".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-OU-000010
- Vuln IDs
-
- V-99785
- Rule IDs
-
- SV-108889r2_rule
Checks: C-98635r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Do not display 'Publish to GAL' button is set to "Enabled". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\ outlook\security If the value for publishtogaldisabled is REG_DWORD = 1, this is not a finding.
Fix: F-105469r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Do not display 'Publish to GAL' button to "Enabled".
- RMF Control
- SC-13
- Severity
- M
- CCI
- CCI-002450
- Version
- O365-OU-000011
- Vuln IDs
-
- V-99787
- Rule IDs
-
- SV-108891r2_rule
Checks: C-98637r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Minimum encryption settings is set to "Enabled" and a Minimum key size (in bits) of "168" or above. Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for minenckey is set to 168 or above, this is not a finding.
Fix: F-105471r3_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Minimum encryption settings to "Enabled"and a Minimum key size (in bits) of "168" or above.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-OU-000012
- Vuln IDs
-
- V-99789
- Rule IDs
-
- SV-108893r2_rule
Checks: C-98639r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Signature Warning is set to "Enabled" "Always warn about invalid signatures". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for warnaboutinvalid is set to REG_DWORD = 1, this is not a finding.
Fix: F-105473r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Signature Warning to "Enabled" "Always warn about invalid signatures".
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000185
- Version
- O365-OU-000013
- Vuln IDs
-
- V-99791
- Rule IDs
-
- SV-108895r2_rule
Checks: C-98641r4_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Signature Status dialog box >> Retrieving CRLs (Certificate Revocation Lists) is set to "Enabled" "When online always retrieve the CRL". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\ outlook\security If the value for usecrlchasing is set to REG_DWORD = 1, this is not a finding.
Fix: F-105475r4_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Cryptography >> Signature Status dialog box >> Retrieving CRLs (Certificate Revocation Lists) to "Enabled" "When online always retrieve the CRL".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-OU-000014
- Vuln IDs
-
- V-99793
- Rule IDs
-
- SV-108897r2_rule
Checks: C-98643r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Outlook Security Mode is set to "Enabled (Use Outlook Security Group Policy)". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\ outlook\security If the value for adminsecuritymode is set to REG_DWORD = 3, this is not a finding.
Fix: F-105477r3_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Outlook Security Mode to "Enabled (Use Outlook Security Group Policy)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-OU-000015
- Vuln IDs
-
- V-99795
- Rule IDs
-
- SV-108899r1_rule
Checks: C-98645r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security >> Allow users to demote attachments to Level 2 is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value allowuserstolowerattachments is set to REG_DWORD = 0, this is not a finding.
Fix: F-105479r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security >> Allow users to demote attachments to Level 2 to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-OU-000016
- Vuln IDs
-
- V-99797
- Rule IDs
-
- SV-108901r2_rule
Checks: C-98647r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security >> Display Level 1 attachments is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security If the value ShowLevel1Attach is REG_DWORD = 0, this is not a finding.
Fix: F-105481r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security "Display Level 1 attachments" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-OU-000017
- Vuln IDs
-
- V-99799
- Rule IDs
-
- SV-108903r1_rule
Checks: C-98649r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security >> Remove file extensions blocked as Level 1 is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security\FileExtensionsRemoveLevel1 If the registry key exists, this is a finding.
Fix: F-105483r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security >> Remove file extensions blocked as Level 1 to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-OU-000018
- Vuln IDs
-
- V-99801
- Rule IDs
-
- SV-108905r1_rule
Checks: C-98651r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security >> Remove file extensions blocked as Level 2 is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook \security\FileExtensionsRemoveLevel2 If the registry key exists, this is a finding.
Fix: F-105485r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Attachment Security >> Remove file extensions blocked as Level 2 to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-OU-000019
- Vuln IDs
-
- V-99803
- Rule IDs
-
- SV-108907r1_rule
Checks: C-98653r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Custom Form Security "Allow scripts in one-off Outlook forms" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security If the value EnableOneOffFormScripts is REG_DWORD = 0, this is not a finding.
Fix: F-105487r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Custom Form Security "Allow scripts in one-off Outlook forms" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-OU-000020
- Vuln IDs
-
- V-99805
- Rule IDs
-
- SV-108909r2_rule
Checks: C-98655r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Set Outlook object model custom actions execution prompt is set to "Enabled" and "Automatically Deny". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for promptoomcustomaction is set to REG_DWORD = 0, this is not a finding.
Fix: F-105489r3_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Set Outlook object model custom actions execution prompt to "Enabled" and select "Automatically Deny".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-OU-000021
- Vuln IDs
-
- V-99807
- Rule IDs
-
- SV-108911r2_rule
Checks: C-98657r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when accessing an address book is set to "Enabled (Automatically Deny)". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for promptoomaddressbookaccess is set to REG_DWORD = 0, this is not a finding.
Fix: F-105491r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when accessing an address book to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-OU-000022
- Vuln IDs
-
- V-99809
- Rule IDs
-
- SV-108913r2_rule
Checks: C-98659r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when accessing the Formula property of a UserProperty object is set to "Enabled (Automatically Deny)". Use the Windows Registry to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\security If the value PromptOOMFormulaAccess is REG_DWORD = 0, this is not a finding.
Fix: F-105493r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt When accessing the Formula property of a UserProperty object to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-OU-000023
- Vuln IDs
-
- V-99811
- Rule IDs
-
- SV-108915r2_rule
Checks: C-98661r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when executing Save As is set to "Enabled (Automatically Deny)". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for promptoomsaveas is set to REG_DWORD = 0, this is not a finding.
Fix: F-105495r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when executing Save As to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-OU-000024
- Vuln IDs
-
- V-99813
- Rule IDs
-
- SV-108917r2_rule
Checks: C-98663r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when reading address information is set to "Enabled (Automatically Deny)". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for promptoomaddressinformationaccess is set to REG_DWORD = 0, this is not a finding.
Fix: F-105497r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when reading address information to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-OU-000025
- Vuln IDs
-
- V-99815
- Rule IDs
-
- SV-108919r2_rule
Checks: C-98665r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when responding to meeting and task requests is set to "Enabled (Automatically Deny)" Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for promptoommeetingtaskrequestresponse is set to REG_DWORD = 0, this is not a finding.
Fix: F-105499r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when responding to meeting and task requests to "Enabled (Automatically Deny)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-002460
- Version
- O365-OU-000026
- Vuln IDs
-
- V-99817
- Rule IDs
-
- SV-108921r2_rule
Checks: C-98667r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when sending mail is set to "Enabled (Automatically Deny)". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for promptoomsend is set to REG_DWORD = 0, this is not a finding.
Fix: F-105501r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Security Form Settings >> Programmatic Security >> Configure Outlook object model prompt when sending mail to "Enabled (Automatically Deny)".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- O365-OU-000027
- Vuln IDs
-
- V-99819
- Rule IDs
-
- SV-108923r1_rule
Checks: C-98669r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Trust Center "Allow hyperlinks in suspected phishing e-mail messages" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\outlook\options\mail If the value JunkMailEnableLinks is REG_DWORD = 0, this is not a finding.
Fix: F-105503r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Trust Center "Allow hyperlinks in suspected phishing e-mail messages" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-OU-000028
- Vuln IDs
-
- V-99821
- Rule IDs
-
- SV-108925r2_rule
Checks: C-98671r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Trust Center >> Security setting for macros must be set to "Enabled: Warn for signed, disable unsigned". Use the Windows Registry to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\outlook\security If the value for level is set to REG_DWORD = 3, this is not a finding.
Fix: F-105505r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Outlook 2016 >> Security >> Trust Center >> Security setting for macros must to "Enabled: Warn for signed, disable unsigned".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- O365-PT-000001
- Vuln IDs
-
- V-99825
- Rule IDs
-
- SV-108929r2_rule
Checks: C-98675r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> VBA Macro Notification Settings is set to "Enabled" "Disable all except digitally signed macros". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\powerpoint\security If the value for vbawarnings is REG_DWORD = 0, this is not a finding.
Fix: F-105509r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> VBA Macro Notification Settings to "Enabled" "Disable all except digitally signed macros".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-PT-000002
- Vuln IDs
-
- V-99827
- Rule IDs
-
- SV-108931r2_rule
Checks: C-98677r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Run Programs is set to "Enabled" "Disable (do not run any programs)". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\powerpoint\security If the value runprograms does not exist, this is not a finding. If the value is REG_DWORD = 0, this is not a finding.
Fix: F-105511r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Run Programs to "Enabled" "Disable (do not run any programs)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-PT-000003
- Vuln IDs
-
- V-99829
- Rule IDs
-
- SV-108933r2_rule
Checks: C-98679r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> File Block Settings >> PowerPoint 97-2003 presentations, shows, templates and add-in files is set to "Enabled" "Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\powerpoint\security\fileblock If the value for binaryfiles is set to REG_DWORD = 1, this is not a finding.
Fix: F-105513r3_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> File Block Settings >> PowerPoint 97-2003 presentations, shows, templates and add-in files to "Enabled" "Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-PT-000004
- Vuln IDs
-
- V-99831
- Rule IDs
-
- SV-108935r1_rule
Checks: C-98681r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> File Block Settings "Set default file block behavior" is set to "Enabled: Blocked files are not opened". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\fileblock If the value OpenInProtectedView is REG_DWORD = 0, this is not a finding.
Fix: F-105515r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> File Block Settings "Set default file block behavior" to "Enabled: Blocked files are not opened".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-PT-000005
- Vuln IDs
-
- V-99833
- Rule IDs
-
- SV-108937r1_rule
Checks: C-98683r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security "Scan encrypted macros in PowerPoint Open XML presentations" is set to "Enabled" and "Scan encrypted macros". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security If the value PowerPointBypassEncryptedMacroScan does not exist, this is not a finding. If the value is REG_DWORD = 0, this is not a finding.
Fix: F-105517r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security "Scan encrypted macros in PowerPoint Open XML presentations" to "Enabled" and "Scan encrypted macros".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-PT-000006
- Vuln IDs
-
- V-99835
- Rule IDs
-
- SV-108939r1_rule
Checks: C-98685r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security "Turn off file validation" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\filevalidation If the value EnableOnLoad is REG_DWORD = 1, this is not a finding.
Fix: F-105519r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security "Turn off file validation" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-PT-000007
- Vuln IDs
-
- V-99837
- Rule IDs
-
- SV-108941r1_rule
Checks: C-98687r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center "Block macros from running in Office files from the Internet" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\powerpoint\security If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding.
Fix: F-105521r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center "Block macros from running in Office files from the Internet" to "Enabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-PT-000008
- Vuln IDs
-
- V-99839
- Rule IDs
-
- SV-108943r1_rule
Checks: C-98689r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\powerpoint\security If the value notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix: F-105523r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-PT-000009
- Vuln IDs
-
- V-99841
- Rule IDs
-
- SV-108945r1_rule
Checks: C-98691r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View "Do not open files from the Internet zone in Protected View" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\protectedview If the value DisableInternetFilesInPV is REG_DWORD = 0, this is not a finding.
Fix: F-105525r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View "Do not open files from the Internet zone in Protected View" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-PT-000010
- Vuln IDs
-
- V-99843
- Rule IDs
-
- SV-108947r1_rule
Checks: C-98693r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View "Turn off Protected View for attachments opened from Outlook" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\protectedview If the value DisableAttachmentsInPV is REG_DWORD = 0, this is not a finding.
Fix: F-105527r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View "Turn off Protected View for attachments opened from Outlook" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-PT-000011
- Vuln IDs
-
- V-99845
- Rule IDs
-
- SV-108949r1_rule
Checks: C-98695r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View "Do not open files in unsafe locations in Protected View" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\protectedview If the value DisableUnsafeLocationsInPV is REG_DWORD = 0, this is not a finding.
Fix: F-105529r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View "Do not open files in unsafe locations in Protected View" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-PT-000012
- Vuln IDs
-
- V-99847
- Rule IDs
-
- SV-108951r1_rule
Checks: C-98697r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View >> Set document behavior if file validation fails is set to "Enabled: Open in Protected View". Verify the check box for "Allow edit" is not selected. Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\filevalidation If the value openinprotectedview does not exist, this is not a finding. If both the value for openinprotectedview is REG_DWORD = 1 and the value for DisableEditFromPV is set to REG_DWORD = 1, this is not a finding.
Fix: F-105531r3_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Protected View >> Set document behavior if file validation fails to "Enabled: Open in Protected View". Uncheck the "Allow edit" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-PT-000013
- Vuln IDs
-
- V-99849
- Rule IDs
-
- SV-108953r1_rule
Checks: C-98699r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Trusted Locations "Allow Trusted Locations on the network" is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\PowerPoint\security\trusted locations If the value AllowNetworkLocations is REG_DWORD = 0, this is not a finding.
Fix: F-105533r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> Trusted Locations "Allow Trusted Locations on the network" to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-PR-000001
- Vuln IDs
-
- V-99851
- Rule IDs
-
- SV-108955r2_rule
Checks: C-98701r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Project 2016 >> Project Options >> Security >> Trust Center >> Allow Trusted Locations on the network is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\ms project\security\trusted locations If the value allownetworklocations is REG_DWORD = 0, this is not a finding.
Fix: F-105535r3_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Project 2016 >> Project Options >> Security >> Trust Center >> Allow Trusted Locations on the network to "Disabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-PR-000002
- Vuln IDs
-
- V-99853
- Rule IDs
-
- SV-108957r1_rule
Checks: C-98703r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Project 2016 >> Project Options >> Security >> Trust Center >> "Disable Trust Bar Notification for unsigned application add-ins and block them" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\ms project\security If the value notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix: F-105537r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Project 2016 >> Project Options >> Security >> Trust Center >> "Disable Trust Bar Notification for unsigned application add-ins and block them" to "Enabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- O365-PR-000003
- Vuln IDs
-
- V-99855
- Rule IDs
-
- SV-108959r2_rule
Checks: C-98705r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> VBA Macro Notification Settings is set to "Enabled" "Disable all except digitally signed macros". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\project\security If the value for vbawarnings is REG_DWORD = 1, this is not a finding.
Fix: F-105539r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft PowerPoint 2016 >> PowerPoint Options >> Security >> Trust Center >> VBA Macro Notification Settings to "Enabled" "Disable all except digitally signed macros".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-PU-000001
- Vuln IDs
-
- V-99857
- Rule IDs
-
- SV-108961r2_rule
Checks: C-98707r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016 >> Security >> Publisher Automation Security Level is set to "Enabled" "By UI (prompted)". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\common\security If the value automationsecuritypublisher is REG_DWORD = 0, this is not a finding.
Fix: F-105541r3_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016 >> Security >> Publisher Automation Security Level to "Enabled" "By UI (prompted)"
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-PU-000002
- Vuln IDs
-
- V-99859
- Rule IDs
-
- SV-108963r2_rule
Checks: C-98709r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016 >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\publisher\security If the value notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix: F-105543r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016 >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins to "Enabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-PU-000003
- Vuln IDs
-
- V-99861
- Rule IDs
-
- SV-108965r2_rule
Checks: C-98711r3_chk
Set policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016 >> Security >> Trust Center >> VBA Macro Notification Settings >> VBA Macro Notification Settings to "Enabled" "Disable all except digitally signed macros" Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\publisher\security If the value vbawarnings is REG_DWORD = 1, this is not a finding.
Fix: F-105545r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Publisher 2016\Security >> Trust Center >> VBA Macro Notification Settings >> VBA Macro Notification Settings must to Disable all except digitally signed macros.
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- O365-VI-000001
- Vuln IDs
-
- V-99863
- Rule IDs
-
- SV-108967r2_rule
Checks: C-98713r3_chk
Verify the policy value for User Configuration >> Administrative Templates/Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> VBA Macro Notification Settings is set to "Enabled" and "Disable all except digitally signed macros". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\visio\security If the value for vbawarnings is REG_DWORD = 3, this is not a finding.
Fix: F-105547r3_fix
Set the policy value for User Configuration >> Administrative Templates/Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> VBA Macro Notification Settings to "Enabled" and select "Disable all except digitally signed macros".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-VI-000002
- Vuln IDs
-
- V-99865
- Rule IDs
-
- SV-108969r1_rule
Checks: C-98715r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> Allow Trusted Locations on the network is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\visio\security\trusted locations If the value for allownetworklocations is REG_DWORD = 0, this is not a finding.
Fix: F-105549r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> Allow Trusted Locations on the network to "Disabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-VI-000003
- Vuln IDs
-
- V-99867
- Rule IDs
-
- SV-108971r2_rule
Checks: C-98717r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins and block them is set to Enabled. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\visio\security If the value notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix: F-105551r3_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins and block them to Enabled.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-VI-000004
- Vuln IDs
-
- V-99869
- Rule IDs
-
- SV-108973r1_rule
Checks: C-98719r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> File Block Settings "Visio 2000-2002 Binary Drawings, Templates and Stencils" is set to "Enabled" and "Open/Save blocked". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\visio\security\fileblock If the value "visio2000files" is REG_DWORD = 2, this is not a finding.
Fix: F-105553r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> File Block Settings "Visio 2000-2002 Binary Drawings, Templates and Stencils" to "Enabled" and "Open/Save blocked".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-VI-000005
- Vuln IDs
-
- V-99871
- Rule IDs
-
- SV-108975r1_rule
Checks: C-98721r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> File Block Settings "Visio 2003-2010 Binary Drawings, Templates and Stencils" is set to "Enabled" and "Open/Save blocked". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\visio\security\fileblock If the value "visio2003files" is REG_DWORD = 2, this is not a finding.
Fix: F-105555r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> File Block Settings "Visio 2003-2010 Binary Drawings, Templates and Stencils" to "Enabled" and "Open/Save blocked".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-VI-000006
- Vuln IDs
-
- V-99873
- Rule IDs
-
- SV-108977r1_rule
Checks: C-98723r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> File Block Settings "Visio 5.0 or earlier Binary Drawings, Templates and Stencils" is set to "Enabled" and "Open/Save blocked". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\visio\security\fileblock If the value "visio50andearlierfiles" is REG_DWORD = 2, this is not a finding.
Fix: F-105557r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> File Block Settings "Visio 5.0 or earlier Binary Drawings, Templates and Stencils" to "Enabled" and "Open/Save blocked".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-VI-000007
- Vuln IDs
-
- V-99875
- Rule IDs
-
- SV-108979r2_rule
Checks: C-98725r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> Block macros from running in Office files from the Internet is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\visio\security If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding.
Fix: F-105559r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Visio 2016 >> Visio Options >> Security >> Trust Center >> Block macros from running in Office files from the Internet to "Enabled".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001749
- Version
- O365-WD-000001
- Vuln IDs
-
- V-99877
- Rule IDs
-
- SV-108981r1_rule
Checks: C-98727r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins and block them is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security If the value for notbpromptunsignedaddin is REG_DWORD = 1, this is not a finding.
Fix: F-105561r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Disable Trust Bar Notification for unsigned application add-ins and block them to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-WD-000002
- Vuln IDs
-
- V-99879
- Rule IDs
-
- SV-108983r2_rule
Checks: C-98729r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Scan encrypted macros in Word Open XML documents is set to "Enabled" "Scan encrypted macros (default)". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security If the value WordBypassEncryptedMacroScan does not exist, this is not a finding. If the value is REG_DWORD = 0, this is not a finding.
Fix: F-105563r3_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Scan encrypted macros in Word Open XML documents to "Enabled" "Scan encrypted macros (default)".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000003
- Vuln IDs
-
- V-99881
- Rule IDs
-
- SV-108985r1_rule
Checks: C-98731r1_chk
Verify the policy setting, User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Protected View >> Do not open files from the Internet zone in Protected View is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security\protectedview If the value for disableinternetfilesinpv is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is REG_DWORD = 1, this is a finding.
Fix: F-105565r1_fix
Set the policy setting, User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Protected View >> Do not open files from the Internet zone in Protected View to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000004
- Vuln IDs
-
- V-99883
- Rule IDs
-
- SV-108987r1_rule
Checks: C-98733r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Protected View >> Do not open files in unsafe locations in Protected View is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security\protectedview. If the value for disableunsafelocationsinpv is REG_DWORD = 0, this is not a finding. If the value does not exist, this is not a finding. If the value is REG_DWORD = 1, this is a finding.
Fix: F-105567r1_fix
Set the policy setting, User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Protected View >> Do not open files in unsafe locations in Protected View to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000005
- Vuln IDs
-
- V-99885
- Rule IDs
-
- SV-108989r1_rule
Checks: C-98735r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Protected View >> Set document behavior if file validation fails is set to "Enabled: Open in Protected View". Verify the check box for "Allow edit" is not selected. Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\Word\security\filevalidation If the value openinprotectedview does not exist, this is not a finding. If both the value for openinprotectedview is REG_DWORD = 1 and the value for DisableEditFromPV is set to REG_DWORD = 1, this is not a finding.
Fix: F-105569r2_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Protected View >> Set document behavior if file validation fails to "Enabled: Open in Protected View". Uncheck the "Allow edit" check box.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000006
- Vuln IDs
-
- V-99887
- Rule IDs
-
- SV-108991r1_rule
Checks: C-98737r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security>> Trust Center>> Protected View >> Turn off Protected View for attachments opened from Outlook is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security\protectedview If the value for disableattachmentsinpv is REG_DWORD = 0, this is not a finding.
Fix: F-105571r1_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security>> Trust Center>> Protected View >> Turn off Protected View for attachments opened from Outlook to "Disabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000007
- Vuln IDs
-
- V-99889
- Rule IDs
-
- SV-108993r1_rule
Checks: C-98739r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Set default file block behavior" is set to "Enabled: Blocked files are not opened". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value OpenInProtectedView is REG_DWORD = 0, this is not a finding.
Fix: F-105573r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Set default file block behavior" to "Enabled: Blocked files are not opened".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000008
- Vuln IDs
-
- V-99891
- Rule IDs
-
- SV-108995r1_rule
Checks: C-98741r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2 and earlier binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value Word2Files is REG_DWORD = 2, this is not a finding.
Fix: F-105575r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2 and earlier binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000009
- Vuln IDs
-
- V-99893
- Rule IDs
-
- SV-108997r1_rule
Checks: C-98743r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2000 binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value Word2000Files is REG_DWORD = 2, this is not a finding.
Fix: F-105577r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2000 binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000010
- Vuln IDs
-
- V-99895
- Rule IDs
-
- SV-108999r1_rule
Checks: C-98745r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2003 binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value word2003files is REG_DWORD = 2, this is not a finding.
Fix: F-105579r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2003 binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000011
- Vuln IDs
-
- V-99897
- Rule IDs
-
- SV-109001r1_rule
Checks: C-98747r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2007 and later binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value word2007files is REG_DWORD = 2, this is not a finding.
Fix: F-105581r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 2007 and later binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000012
- Vuln IDs
-
- V-99899
- Rule IDs
-
- SV-109003r1_rule
Checks: C-98749r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 6.0 binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value word60files is REG_DWORD = 2, this is not a finding.
Fix: F-105583r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 6.0 binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000013
- Vuln IDs
-
- V-99901
- Rule IDs
-
- SV-109005r1_rule
Checks: C-98751r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 95 binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value word95files is REG_DWORD = 2, this is not a finding.
Fix: F-105585r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 95 binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000014
- Vuln IDs
-
- V-99903
- Rule IDs
-
- SV-109007r1_rule
Checks: C-98753r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 97 binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value word97files is REG_DWORD = 2, this is not a finding.
Fix: F-105587r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word 97 binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001662
- Version
- O365-WD-000015
- Vuln IDs
-
- V-99905
- Rule IDs
-
- SV-109009r1_rule
Checks: C-98755r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word XP binary documents and templates" is set to "Enabled: Open/Save blocked, use open policy". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security\fileblock If the value wordxpfiles is REG_DWORD = 2, this is not a finding.
Fix: F-105589r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> File Block Settings "Word XP binary documents and templates" to "Enabled: Open/Save blocked, use open policy".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-WD-000016
- Vuln IDs
-
- V-99907
- Rule IDs
-
- SV-109011r1_rule
Checks: C-98757r1_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center "Block macros from running in Office files from the Internet" is set to "Enabled". Use the Windows Registry Editor to navigate to the following key: HKCU\Software\Policies\Microsoft\Office\16.0\word\security If the value blockcontentexecutionfrominternet is REG_DWORD = 1, this is not a finding.
Fix: F-105591r1_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center "Block macros from running in Office files from the Internet" to "Enabled".
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001170
- Version
- O365-WD-000017
- Vuln IDs
-
- V-99909
- Rule IDs
-
- SV-109013r2_rule
Checks: C-98759r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Trusted Locations >> Allow Trusted Locations on the network is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security\trusted locations If the value for allownetworklocations is REG_DWORD = 0, this is not a finding.
Fix: F-105593r3_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Trust Center >> Trusted Locations >> Allow Trusted Locations on the network to "Disabled".
- RMF Control
- CM-7
- Severity
- M
- CCI
- CCI-000381
- Version
- O365-WD-000018
- Vuln IDs
-
- V-99911
- Rule IDs
-
- SV-109015r2_rule
Checks: C-98761r2_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Security >> Trust Center >> "VBA macro Notification Settings" is set to "Enabled" and "Disable all except digitally signed macros" from the Options. Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\Microsoft\office\16.0\word\security If the value vbawarnings is REG_DWORD = 3, this is not a finding.
Fix: F-105595r3_fix
Set the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Security >> Trust Center >> "VBA macro Notification Settings" to "Enabled" and "Disable all except digitally signed macros" from the Options.
- RMF Control
- SC-18
- Severity
- M
- CCI
- CCI-001695
- Version
- O365-WD-000019
- Vuln IDs
-
- V-100517
- Rule IDs
-
- SV-109621r2_rule
Checks: C-99375r3_chk
Verify the policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Turn off file validation is set to "Disabled". Use the Windows Registry Editor to navigate to the following key: HKCU\software\policies\microsoft\office\16.0\word\security\filevalidation If the value for enableonload is REG_DWORD = 1, this is not a finding.
Fix: F-106203r2_fix
Set policy value for User Configuration >> Administrative Templates >> Microsoft Word 2016 >> Word Options >> Security >> Turn off file validation to "Disabled".